SlideShare a Scribd company logo
1 of 5
Download to read offline
Computer Science and Information Technologies
Vol. 1, No. 3, November 2020, pp. 116~120
ISSN: 2722-3221, DOI: 10.11591/csit.v1i3.p116-120  116
Journal homepage: http://iaesprime.com/index.php/csit
Hand gesture recognition using machine learning algorithms
Abhishek B1
, Kanya Krishi2
, Meghana M3
, Mohammed Daaniyaal4
, Anupama H S5
1,2,3,4
B. E, Computer Science and Engineering, BMS Institute of Technology, Bangalore, India
5
BMS Institute of Technology, Bangalore, India
Article Info ABSTRACT
Article history:
Received Apr 24, 2020
Revised Jun 14, 2020
Accepted Jun 29, 2020
Gesture recognition is an emerging topic in today’s technologies. The main
focus of this is to recognize the human gestures using mathematical algorithms
for human computer interaction. Only a few modes of human-computer
interaction exist, they are: through keyboard, mouse, touch screens etc. Each
of these devices has their own limitations when it comes to adapting more
versatile hardware in computers. Gesture recognition is one of the essential
techniques to build user-friendly interfaces. Usually, gestures can be
originated from any bodily motion or state, but commonly originate from the
face or hand. Gesture recognition enables users to interact with the devices
without physically touching them. This paper describes how hand gestures are
trained to perform certain actions like switching pages, scrolling up or down
in a page.
Keywords:
Gesture recognition
Human–computer interaction
User-friendly interface
This is an open access article under the CC BY-SA license.
Corresponding Author:
Abhishek B,
B.E, Computer Science and Engineering,
BMS Institute of Technology, Bangalore, India.
Email: anupamahs@bmsit.in
1. INTRODUCTION
Gesture recognition is a technique which is used to understand and analyze the human body language
and interact with the user accordingly. This in turn helps in building a bridge between the machine and the user
to communicate with each other. Gesture recognition is useful in processing the information which cannot be
conveyed through speech or text. Gestures are the simplest means of communicating something that is
meaningful. This paper involves implementation of the system that aims to design a vision-based hand gesture
recognition system with a high correct detection rate along with a high-performance criterion, which can work
in a real time human–computer interaction (HCI) system without having any of the limitations (gloves, uniform
background etc.) on the user environment. The system can be defined using a flowchart that contains three
main steps, they are: learning, detection, recognition as shown in Figure 1.
Learning involves two aspects such as:
− Training dataset: This is the dataset that consists of different types of hand gestures that are used to train
the system based on which the system performs the actions.
− Feature extraction: It involves determining the centroid that divides the image into two halves at its
geometric centre.
Detection involves three aspects:
− Capture scene: Captures the images through a web camera, which is used as an input to the system.
− Preprocessing: Images that are captured through the webcam are compared with the dataset to recognize
the valid hand movements that are needed to perform the required actions.
− Hand detection: The requirements for hand detection involve the input image from the webcam.
The image should be fetched with a speed of 20 frames per second. Distance should also be maintained
Comput. Sci. Inf. Technol. 
Hand gesture recognition using machine learning algorithms… (Abhishek B)
117
between the hand and the camera. Approximate distance that should be between hand the camera is around
30 to 100 cm. The video input is stored frame by frame into a matrix after preprocessing.
Recognition consists of:
− Gesture recognition: The number of fingers present in the hand gesture is determined by making use of
defect points present in the gesture. The resultant gesture obtained is fed through a 3-dimensional
convolutional neural network consecutively to recognize the current gesture.
− Performing action: The recognized gesture is used as an input to perform the actions required by the user.
Figure 1. Flowchart of HCI
2. LITERATURE SURVEY
The implementation is divided into four main steps: 1) image enhancement and segmentation, 2)
orientation detection, 3) feature extraction, and 4) classification [1]. This work was focused on above four
categories but main limitation was change of color was happening very rapidly by the change in the different
lighting condition, which may cause error or even failures. For example, due to insufficient light condition, the
existence of hand area is not detected but the non-skin regions are mistaken for the hand area because of same
color [2]. Involves three main steps for hand gesture recognition system: 1) segmentation, 2) feature
representation 3) recognition techniques. The system is based on hand gesture recognition by modeling of the
hand in spatial domain. The system uses various 2D and 3D geometric and non-geometric models for modeling.
It has used fuzzy c-means clustering algorithm which resulted in an accuracy of 85.83%. The main drawback
of the system is it does not consider gesture recognition of temporal space, i.e., motion of gestures and it is
unable to classify images with complex background i.e., where there are other objects in the scene with the
hand objects [3]. This survey focuses on the hand gesture recognition using different steps like data acquisition,
pre-processing, segmentation and so on. Suitable input device should be selected for the data acquisition. There
are a number of input devices for data acquisition. Some of them are data gloves, marker, and hand images
(from webcam/Kinect 3D Sensor). But the limitation with this work was change in the illumination, rotation
and orientation, scaling problem and special hardware which is pretty costlier [4]. The system implementation
is divided into three phases: 1) Hand gesture recognition using kinetic camera, 2) algorithms for hand detection
recognition, 3) hand gesture recognition. The limitation here is that the edge detection and segmentation
algorithms used here are not very efficient when compared to neural networks. The dataset being considered
here is very small and can be used to detect very few sign gestures.
The system architecture consists of: 1) image acquisition, 2) segmentation of hand region, 3) distance
transforms method for gesture recognition [5]. The limitations of this system involve 1) the numbers of gestures
 ISSN: 2722-3221
Comput. Sci. Inf. Technol., Vol. 1, No. 3, November 2020: 117 – 120
118
that are recognized are less and 2) the gestures recognized were not used to control any applications [6]. In this
implementation there are three main algorithms that are used: 1) Viola–Jones algorithm. 2) convex hull
algorithm, 3) the AdaBoost based learning algorithm. The work was accomplished by training a set of feature
set which is local contour sequence. The limitations of this system are that it requires two sets of images for
classification. One is the positive set that contains the required images, the other is the negative set that contains
contradicting images [7]. The system implementation consists of three components: 1) hand detection 2)
gesture recognition, and 3) HCI. It has implemented the following methodology: 1) the input image is
preprocessed and the hand detector tries to filter out the hand from the input image, 2) a CNN classifier is
employed to recognize gestures from the processed image, while a Kalman Filter is used to estimate the position
of the mouse cursor, and 3) the recognition and estimation results are submitted to a control centre which
decides the action to be taken. One of the limitations of this system is that it recognizes only the static images
[8]. This implementation focuses on detection of hand gestures using java and neural networks. It is divided
into two phases: 1) Detection module using java where in the hand is detected using background subtraction
and conversion of video feed into HSB video feed thus detecting skin pixels; 2) The second module is the
prediction module; a convolutional neural network is used. The input feed image is gained from Java. The input
image is fed into the neural network and is analyzed with respect to the dataset images. One of the limitations
of this system is that it requires socket programming in order to connect java and python modules.
3. IMPLEMENTATION
A hand gesture recognition system was developed to capture the hand gestures being performed by
the user and to control a computer system based on the incoming information. Many of the existing systems in
literature have implemented gesture recognition using only spatial modelling, i.e., recognition of a single
gesture and not temporal modelling i.e., recognition of motion of gestures. Also, the existing systems have not
been implemented in real time, they use a pre captured image as an input for gesture recognition. To overcome
these existing problems a new architecture has been developed which aims to design a vision-based hand
gesture recognition system with a high correct detection rate along with a high-performance criterion, which
can work in a real time HCI system without having any of the mentioned strict limitations (gloves, uniform
background, etc.) on the user environment. The design is composed of a HCI system which uses hand gestures
as input for communication as show in Figure 2.
Figure 2. Design of the proposed HCI system
Comput. Sci. Inf. Technol. 
Hand gesture recognition using machine learning algorithms… (Abhishek B)
119
Input to the system is from the web camera or a prerecorded video sequence. Later it detects the skin
color by using an adaptive algorithm in the beginning of the frames. For the current user skin color has to be
fixed based on the lighting and camera parameter and condition. Once it has been fixed, hand is localized with
a histogram clustering method. Then a machine learning algorithm has been used to detect the hand gestures
in consecutive frames to distinguish the current gesture. These gestures are used as an input for a computer
application as shown in Figure 3. The system is divided into 3 subsystems:
3.1. Hand and motion detection
The Web-camera captures the hand movement and provides it as input to OpenCV and TensorFlow
Object detector. Edge detection and skin detection are performed to obtain the boundary of the hand. This is
then sent to the 3D CNN.
3.2. Dataset
Dataset is used for training the 3D CNN. Two types of datasets are being used–one for the hand
detection and the other for the motion or gesture detection. Hand detection uses EGO dataset, Motion or
Gesture Recognition uses Jester dataset.
3.3. 3D CNN
CNN’s are a class of deep learning neural networks used for analyzing videos and images. It consists
of several layers–input layer, hidden layers, and output layer. It performs back propagation for better accuracy
and efficiency. It performs training and verification of the recognized gestures and HCIs take place–turning of
the pages, zooming in, and zooming out. The interactions with the computer take place with the help of
PyAutoGUI or System Calls.
Figure 3. System recognized hand gestures
4. CONCLUSION
The importance of gesture recognition lies in building efficient human-machine interaction. This
paper describes how the implementation of the system is done based upon the images captured. Hand detection
is done using OpenCV and TensorFlow object detector. And further it is enhanced for interpretation of gestures
by the computer to perform actions like switching the pages, scrolling up or down the page.
 ISSN: 2722-3221
Comput. Sci. Inf. Technol., Vol. 1, No. 3, November 2020: 117 – 120
120
ACKNOWLEDGEMENT
This work is done, supervised, and supported by the students and faculty members of the Department
of Computer Science and Engineering, BMS Institute of Technology, Bangalore.
REFERENCES
[1] M. Panwar and P. S. Mehra, “Hand gesture recognition for human computer interaction,” 2011 International
Conference on Image Information Processing, Shimla, pp. 1-7, 2011.
[2] R. Zaman Khan and N. A. Ibraheem, “Comparative Study of Hand Gesture Recognition System,” International
Conference of Advanced Computer Science & Information Technology, 2012.
[3] A. R. Sarkar, G. Sanyal, and S. Majumder, “Hand Gesture Recognition Systems: A Survey,” International Journal
of Computer Applications, vol. 71, no.15, pp. 25-37, May 2013.
[4] A. E. Manjunath, B. P. V. Kumar, H. Rajesh, “Comparative Study of Hand Gesture Recognition Algorithms,”
International Journal of Research in Computer and Communication Technology, vol 3, no. 4, April 2014.
[5] D. R. Jadhav and L. M. R. J. Lobo, “Navigation of PowerPoint Using Hand Gestures,” International Journal of
Science and Research (IJSR), vol. 4, no. 1, pp. 833-837, 2015.
[6] R. M. Gurav and P. K. Kadbe, "Real time finger tracking and contour detection for gesture recognition using
OpenCV," 2015 International Conference on Industrial Instrumentation and Control (ICIC), pp. 974-977, 2015.
[7] P. Xu, “A Real-time Hand Gesture Recognition and Human-Computer Interaction System,” 2017, [Online].
Available: https://arxiv.org/abs/1704.07296
[8] P. Suganya, R. Sathya, and K. Vijayalakshmi, “Detection and Recognition of Gestures to Control the System
Applications by Neural Networks,” International Journal of Pure and Applied Mathematics, vol. 118, no. 10, pp.
399-405, January 2018.

More Related Content

Similar to Hand gesture recognition using machine learning algorithms

Media Control Using Hand Gesture Moments
Media Control Using Hand Gesture MomentsMedia Control Using Hand Gesture Moments
Media Control Using Hand Gesture MomentsIRJET Journal
 
Natural Hand Gestures Recognition System for Intelligent HCI: A Survey
Natural Hand Gestures Recognition System for Intelligent HCI: A SurveyNatural Hand Gestures Recognition System for Intelligent HCI: A Survey
Natural Hand Gestures Recognition System for Intelligent HCI: A SurveyEditor IJCATR
 
Real Time Vision Hand Gesture Recognition Based Media Control via LAN & Wirel...
Real Time Vision Hand Gesture Recognition Based Media Control via LAN & Wirel...Real Time Vision Hand Gesture Recognition Based Media Control via LAN & Wirel...
Real Time Vision Hand Gesture Recognition Based Media Control via LAN & Wirel...IJMER
 
Virtual Yoga System Using Kinect Sensor
Virtual Yoga System Using Kinect SensorVirtual Yoga System Using Kinect Sensor
Virtual Yoga System Using Kinect SensorIRJET Journal
 
Controlling Computer using Hand Gestures
Controlling Computer using Hand GesturesControlling Computer using Hand Gestures
Controlling Computer using Hand GesturesIRJET Journal
 
Hand gesture recognition using support vector machine
Hand gesture recognition using support vector machineHand gesture recognition using support vector machine
Hand gesture recognition using support vector machinetheijes
 
Accessing Operating System using Finger Gesture
Accessing Operating System using Finger GestureAccessing Operating System using Finger Gesture
Accessing Operating System using Finger GestureIRJET Journal
 
Computer Based Human Gesture Recognition With Study Of Algorithms
Computer Based Human Gesture Recognition With Study Of AlgorithmsComputer Based Human Gesture Recognition With Study Of Algorithms
Computer Based Human Gesture Recognition With Study Of AlgorithmsIOSR Journals
 
IRJET- Convenience Improvement for Graphical Interface using Gesture Dete...
IRJET-  	  Convenience Improvement for Graphical Interface using Gesture Dete...IRJET-  	  Convenience Improvement for Graphical Interface using Gesture Dete...
IRJET- Convenience Improvement for Graphical Interface using Gesture Dete...IRJET Journal
 
Smart Presentation Control by Hand Gestures Using Computer Vision and Google’...
Smart Presentation Control by Hand Gestures Using Computer Vision and Google’...Smart Presentation Control by Hand Gestures Using Computer Vision and Google’...
Smart Presentation Control by Hand Gestures Using Computer Vision and Google’...IRJET Journal
 
IRJET- Sign Language Interpreter
IRJET- Sign Language InterpreterIRJET- Sign Language Interpreter
IRJET- Sign Language InterpreterIRJET Journal
 
Analysis of Inertial Sensor Data Using Trajectory Recognition Algorithm
Analysis of Inertial Sensor Data Using Trajectory Recognition AlgorithmAnalysis of Inertial Sensor Data Using Trajectory Recognition Algorithm
Analysis of Inertial Sensor Data Using Trajectory Recognition Algorithmijcisjournal
 
Real time human-computer interaction
Real time human-computer interactionReal time human-computer interaction
Real time human-computer interactionijfcstjournal
 
Gesture final report new
Gesture final report newGesture final report new
Gesture final report newchithiracyriac
 
Gesture Recognition Technology
Gesture Recognition TechnologyGesture Recognition Technology
Gesture Recognition TechnologyNikith Kumar Reddy
 
HAND GESTURE CONTROLLED MOUSE
HAND GESTURE CONTROLLED MOUSEHAND GESTURE CONTROLLED MOUSE
HAND GESTURE CONTROLLED MOUSEIRJET Journal
 

Similar to Hand gesture recognition using machine learning algorithms (20)

Media Control Using Hand Gesture Moments
Media Control Using Hand Gesture MomentsMedia Control Using Hand Gesture Moments
Media Control Using Hand Gesture Moments
 
Natural Hand Gestures Recognition System for Intelligent HCI: A Survey
Natural Hand Gestures Recognition System for Intelligent HCI: A SurveyNatural Hand Gestures Recognition System for Intelligent HCI: A Survey
Natural Hand Gestures Recognition System for Intelligent HCI: A Survey
 
Real Time Vision Hand Gesture Recognition Based Media Control via LAN & Wirel...
Real Time Vision Hand Gesture Recognition Based Media Control via LAN & Wirel...Real Time Vision Hand Gesture Recognition Based Media Control via LAN & Wirel...
Real Time Vision Hand Gesture Recognition Based Media Control via LAN & Wirel...
 
Virtual Yoga System Using Kinect Sensor
Virtual Yoga System Using Kinect SensorVirtual Yoga System Using Kinect Sensor
Virtual Yoga System Using Kinect Sensor
 
Controlling Computer using Hand Gestures
Controlling Computer using Hand GesturesControlling Computer using Hand Gestures
Controlling Computer using Hand Gestures
 
Hand gesture recognition using support vector machine
Hand gesture recognition using support vector machineHand gesture recognition using support vector machine
Hand gesture recognition using support vector machine
 
HAND GESTURE RECOGNITION FOR HCI (HUMANCOMPUTER INTERACTION) USING ARTIFICIAL...
HAND GESTURE RECOGNITION FOR HCI (HUMANCOMPUTER INTERACTION) USING ARTIFICIAL...HAND GESTURE RECOGNITION FOR HCI (HUMANCOMPUTER INTERACTION) USING ARTIFICIAL...
HAND GESTURE RECOGNITION FOR HCI (HUMANCOMPUTER INTERACTION) USING ARTIFICIAL...
 
Accessing Operating System using Finger Gesture
Accessing Operating System using Finger GestureAccessing Operating System using Finger Gesture
Accessing Operating System using Finger Gesture
 
Computer Based Human Gesture Recognition With Study Of Algorithms
Computer Based Human Gesture Recognition With Study Of AlgorithmsComputer Based Human Gesture Recognition With Study Of Algorithms
Computer Based Human Gesture Recognition With Study Of Algorithms
 
IRJET- Convenience Improvement for Graphical Interface using Gesture Dete...
IRJET-  	  Convenience Improvement for Graphical Interface using Gesture Dete...IRJET-  	  Convenience Improvement for Graphical Interface using Gesture Dete...
IRJET- Convenience Improvement for Graphical Interface using Gesture Dete...
 
Smart Presentation Control by Hand Gestures Using Computer Vision and Google’...
Smart Presentation Control by Hand Gestures Using Computer Vision and Google’...Smart Presentation Control by Hand Gestures Using Computer Vision and Google’...
Smart Presentation Control by Hand Gestures Using Computer Vision and Google’...
 
Niknewppt
NiknewpptNiknewppt
Niknewppt
 
IRJET- Sign Language Interpreter
IRJET- Sign Language InterpreterIRJET- Sign Language Interpreter
IRJET- Sign Language Interpreter
 
Analysis of Inertial Sensor Data Using Trajectory Recognition Algorithm
Analysis of Inertial Sensor Data Using Trajectory Recognition AlgorithmAnalysis of Inertial Sensor Data Using Trajectory Recognition Algorithm
Analysis of Inertial Sensor Data Using Trajectory Recognition Algorithm
 
Real time human-computer interaction
Real time human-computer interactionReal time human-computer interaction
Real time human-computer interaction
 
Gesture final report new
Gesture final report newGesture final report new
Gesture final report new
 
G0342039042
G0342039042G0342039042
G0342039042
 
Nikppt
NikpptNikppt
Nikppt
 
Gesture Recognition Technology
Gesture Recognition TechnologyGesture Recognition Technology
Gesture Recognition Technology
 
HAND GESTURE CONTROLLED MOUSE
HAND GESTURE CONTROLLED MOUSEHAND GESTURE CONTROLLED MOUSE
HAND GESTURE CONTROLLED MOUSE
 

More from CSITiaesprime

Hybrid model for detection of brain tumor using convolution neural networks
Hybrid model for detection of brain tumor using convolution neural networksHybrid model for detection of brain tumor using convolution neural networks
Hybrid model for detection of brain tumor using convolution neural networksCSITiaesprime
 
Implementing lee's model to apply fuzzy time series in forecasting bitcoin price
Implementing lee's model to apply fuzzy time series in forecasting bitcoin priceImplementing lee's model to apply fuzzy time series in forecasting bitcoin price
Implementing lee's model to apply fuzzy time series in forecasting bitcoin priceCSITiaesprime
 
Sentiment analysis of online licensing service quality in the energy and mine...
Sentiment analysis of online licensing service quality in the energy and mine...Sentiment analysis of online licensing service quality in the energy and mine...
Sentiment analysis of online licensing service quality in the energy and mine...CSITiaesprime
 
Trends in sentiment of Twitter users towards Indonesian tourism: analysis wit...
Trends in sentiment of Twitter users towards Indonesian tourism: analysis wit...Trends in sentiment of Twitter users towards Indonesian tourism: analysis wit...
Trends in sentiment of Twitter users towards Indonesian tourism: analysis wit...CSITiaesprime
 
The impact of usability in information technology projects
The impact of usability in information technology projectsThe impact of usability in information technology projects
The impact of usability in information technology projectsCSITiaesprime
 
Collecting and analyzing network-based evidence
Collecting and analyzing network-based evidenceCollecting and analyzing network-based evidence
Collecting and analyzing network-based evidenceCSITiaesprime
 
Agile adoption challenges in insurance: a systematic literature and expert re...
Agile adoption challenges in insurance: a systematic literature and expert re...Agile adoption challenges in insurance: a systematic literature and expert re...
Agile adoption challenges in insurance: a systematic literature and expert re...CSITiaesprime
 
Exploring network security threats through text mining techniques: a comprehe...
Exploring network security threats through text mining techniques: a comprehe...Exploring network security threats through text mining techniques: a comprehe...
Exploring network security threats through text mining techniques: a comprehe...CSITiaesprime
 
An LSTM-based prediction model for gradient-descending optimization in virtua...
An LSTM-based prediction model for gradient-descending optimization in virtua...An LSTM-based prediction model for gradient-descending optimization in virtua...
An LSTM-based prediction model for gradient-descending optimization in virtua...CSITiaesprime
 
Generalization of linear and non-linear support vector machine in multiple fi...
Generalization of linear and non-linear support vector machine in multiple fi...Generalization of linear and non-linear support vector machine in multiple fi...
Generalization of linear and non-linear support vector machine in multiple fi...CSITiaesprime
 
Designing a framework for blockchain-based e-voting system for Libya
Designing a framework for blockchain-based e-voting system for LibyaDesigning a framework for blockchain-based e-voting system for Libya
Designing a framework for blockchain-based e-voting system for LibyaCSITiaesprime
 
Development reference model to build management reporter using dynamics great...
Development reference model to build management reporter using dynamics great...Development reference model to build management reporter using dynamics great...
Development reference model to build management reporter using dynamics great...CSITiaesprime
 
Social media and optimization of the promotion of Lake Toba tourism destinati...
Social media and optimization of the promotion of Lake Toba tourism destinati...Social media and optimization of the promotion of Lake Toba tourism destinati...
Social media and optimization of the promotion of Lake Toba tourism destinati...CSITiaesprime
 
Caring jacket: health monitoring jacket integrated with the internet of thing...
Caring jacket: health monitoring jacket integrated with the internet of thing...Caring jacket: health monitoring jacket integrated with the internet of thing...
Caring jacket: health monitoring jacket integrated with the internet of thing...CSITiaesprime
 
Net impact implementation application development life-cycle management in ba...
Net impact implementation application development life-cycle management in ba...Net impact implementation application development life-cycle management in ba...
Net impact implementation application development life-cycle management in ba...CSITiaesprime
 
Circularly polarized metamaterial Antenna in energy harvesting wearable commu...
Circularly polarized metamaterial Antenna in energy harvesting wearable commu...Circularly polarized metamaterial Antenna in energy harvesting wearable commu...
Circularly polarized metamaterial Antenna in energy harvesting wearable commu...CSITiaesprime
 
An ensemble approach for the identification and classification of crime tweet...
An ensemble approach for the identification and classification of crime tweet...An ensemble approach for the identification and classification of crime tweet...
An ensemble approach for the identification and classification of crime tweet...CSITiaesprime
 
National archival platform system design using the microservice-based service...
National archival platform system design using the microservice-based service...National archival platform system design using the microservice-based service...
National archival platform system design using the microservice-based service...CSITiaesprime
 
Antispoofing in face biometrics: A comprehensive study on software-based tech...
Antispoofing in face biometrics: A comprehensive study on software-based tech...Antispoofing in face biometrics: A comprehensive study on software-based tech...
Antispoofing in face biometrics: A comprehensive study on software-based tech...CSITiaesprime
 
The antecedent e-government quality for public behaviour intention, and exten...
The antecedent e-government quality for public behaviour intention, and exten...The antecedent e-government quality for public behaviour intention, and exten...
The antecedent e-government quality for public behaviour intention, and exten...CSITiaesprime
 

More from CSITiaesprime (20)

Hybrid model for detection of brain tumor using convolution neural networks
Hybrid model for detection of brain tumor using convolution neural networksHybrid model for detection of brain tumor using convolution neural networks
Hybrid model for detection of brain tumor using convolution neural networks
 
Implementing lee's model to apply fuzzy time series in forecasting bitcoin price
Implementing lee's model to apply fuzzy time series in forecasting bitcoin priceImplementing lee's model to apply fuzzy time series in forecasting bitcoin price
Implementing lee's model to apply fuzzy time series in forecasting bitcoin price
 
Sentiment analysis of online licensing service quality in the energy and mine...
Sentiment analysis of online licensing service quality in the energy and mine...Sentiment analysis of online licensing service quality in the energy and mine...
Sentiment analysis of online licensing service quality in the energy and mine...
 
Trends in sentiment of Twitter users towards Indonesian tourism: analysis wit...
Trends in sentiment of Twitter users towards Indonesian tourism: analysis wit...Trends in sentiment of Twitter users towards Indonesian tourism: analysis wit...
Trends in sentiment of Twitter users towards Indonesian tourism: analysis wit...
 
The impact of usability in information technology projects
The impact of usability in information technology projectsThe impact of usability in information technology projects
The impact of usability in information technology projects
 
Collecting and analyzing network-based evidence
Collecting and analyzing network-based evidenceCollecting and analyzing network-based evidence
Collecting and analyzing network-based evidence
 
Agile adoption challenges in insurance: a systematic literature and expert re...
Agile adoption challenges in insurance: a systematic literature and expert re...Agile adoption challenges in insurance: a systematic literature and expert re...
Agile adoption challenges in insurance: a systematic literature and expert re...
 
Exploring network security threats through text mining techniques: a comprehe...
Exploring network security threats through text mining techniques: a comprehe...Exploring network security threats through text mining techniques: a comprehe...
Exploring network security threats through text mining techniques: a comprehe...
 
An LSTM-based prediction model for gradient-descending optimization in virtua...
An LSTM-based prediction model for gradient-descending optimization in virtua...An LSTM-based prediction model for gradient-descending optimization in virtua...
An LSTM-based prediction model for gradient-descending optimization in virtua...
 
Generalization of linear and non-linear support vector machine in multiple fi...
Generalization of linear and non-linear support vector machine in multiple fi...Generalization of linear and non-linear support vector machine in multiple fi...
Generalization of linear and non-linear support vector machine in multiple fi...
 
Designing a framework for blockchain-based e-voting system for Libya
Designing a framework for blockchain-based e-voting system for LibyaDesigning a framework for blockchain-based e-voting system for Libya
Designing a framework for blockchain-based e-voting system for Libya
 
Development reference model to build management reporter using dynamics great...
Development reference model to build management reporter using dynamics great...Development reference model to build management reporter using dynamics great...
Development reference model to build management reporter using dynamics great...
 
Social media and optimization of the promotion of Lake Toba tourism destinati...
Social media and optimization of the promotion of Lake Toba tourism destinati...Social media and optimization of the promotion of Lake Toba tourism destinati...
Social media and optimization of the promotion of Lake Toba tourism destinati...
 
Caring jacket: health monitoring jacket integrated with the internet of thing...
Caring jacket: health monitoring jacket integrated with the internet of thing...Caring jacket: health monitoring jacket integrated with the internet of thing...
Caring jacket: health monitoring jacket integrated with the internet of thing...
 
Net impact implementation application development life-cycle management in ba...
Net impact implementation application development life-cycle management in ba...Net impact implementation application development life-cycle management in ba...
Net impact implementation application development life-cycle management in ba...
 
Circularly polarized metamaterial Antenna in energy harvesting wearable commu...
Circularly polarized metamaterial Antenna in energy harvesting wearable commu...Circularly polarized metamaterial Antenna in energy harvesting wearable commu...
Circularly polarized metamaterial Antenna in energy harvesting wearable commu...
 
An ensemble approach for the identification and classification of crime tweet...
An ensemble approach for the identification and classification of crime tweet...An ensemble approach for the identification and classification of crime tweet...
An ensemble approach for the identification and classification of crime tweet...
 
National archival platform system design using the microservice-based service...
National archival platform system design using the microservice-based service...National archival platform system design using the microservice-based service...
National archival platform system design using the microservice-based service...
 
Antispoofing in face biometrics: A comprehensive study on software-based tech...
Antispoofing in face biometrics: A comprehensive study on software-based tech...Antispoofing in face biometrics: A comprehensive study on software-based tech...
Antispoofing in face biometrics: A comprehensive study on software-based tech...
 
The antecedent e-government quality for public behaviour intention, and exten...
The antecedent e-government quality for public behaviour intention, and exten...The antecedent e-government quality for public behaviour intention, and exten...
The antecedent e-government quality for public behaviour intention, and exten...
 

Recently uploaded

APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 

Recently uploaded (20)

APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 

Hand gesture recognition using machine learning algorithms

  • 1. Computer Science and Information Technologies Vol. 1, No. 3, November 2020, pp. 116~120 ISSN: 2722-3221, DOI: 10.11591/csit.v1i3.p116-120  116 Journal homepage: http://iaesprime.com/index.php/csit Hand gesture recognition using machine learning algorithms Abhishek B1 , Kanya Krishi2 , Meghana M3 , Mohammed Daaniyaal4 , Anupama H S5 1,2,3,4 B. E, Computer Science and Engineering, BMS Institute of Technology, Bangalore, India 5 BMS Institute of Technology, Bangalore, India Article Info ABSTRACT Article history: Received Apr 24, 2020 Revised Jun 14, 2020 Accepted Jun 29, 2020 Gesture recognition is an emerging topic in today’s technologies. The main focus of this is to recognize the human gestures using mathematical algorithms for human computer interaction. Only a few modes of human-computer interaction exist, they are: through keyboard, mouse, touch screens etc. Each of these devices has their own limitations when it comes to adapting more versatile hardware in computers. Gesture recognition is one of the essential techniques to build user-friendly interfaces. Usually, gestures can be originated from any bodily motion or state, but commonly originate from the face or hand. Gesture recognition enables users to interact with the devices without physically touching them. This paper describes how hand gestures are trained to perform certain actions like switching pages, scrolling up or down in a page. Keywords: Gesture recognition Human–computer interaction User-friendly interface This is an open access article under the CC BY-SA license. Corresponding Author: Abhishek B, B.E, Computer Science and Engineering, BMS Institute of Technology, Bangalore, India. Email: anupamahs@bmsit.in 1. INTRODUCTION Gesture recognition is a technique which is used to understand and analyze the human body language and interact with the user accordingly. This in turn helps in building a bridge between the machine and the user to communicate with each other. Gesture recognition is useful in processing the information which cannot be conveyed through speech or text. Gestures are the simplest means of communicating something that is meaningful. This paper involves implementation of the system that aims to design a vision-based hand gesture recognition system with a high correct detection rate along with a high-performance criterion, which can work in a real time human–computer interaction (HCI) system without having any of the limitations (gloves, uniform background etc.) on the user environment. The system can be defined using a flowchart that contains three main steps, they are: learning, detection, recognition as shown in Figure 1. Learning involves two aspects such as: − Training dataset: This is the dataset that consists of different types of hand gestures that are used to train the system based on which the system performs the actions. − Feature extraction: It involves determining the centroid that divides the image into two halves at its geometric centre. Detection involves three aspects: − Capture scene: Captures the images through a web camera, which is used as an input to the system. − Preprocessing: Images that are captured through the webcam are compared with the dataset to recognize the valid hand movements that are needed to perform the required actions. − Hand detection: The requirements for hand detection involve the input image from the webcam. The image should be fetched with a speed of 20 frames per second. Distance should also be maintained
  • 2. Comput. Sci. Inf. Technol.  Hand gesture recognition using machine learning algorithms… (Abhishek B) 117 between the hand and the camera. Approximate distance that should be between hand the camera is around 30 to 100 cm. The video input is stored frame by frame into a matrix after preprocessing. Recognition consists of: − Gesture recognition: The number of fingers present in the hand gesture is determined by making use of defect points present in the gesture. The resultant gesture obtained is fed through a 3-dimensional convolutional neural network consecutively to recognize the current gesture. − Performing action: The recognized gesture is used as an input to perform the actions required by the user. Figure 1. Flowchart of HCI 2. LITERATURE SURVEY The implementation is divided into four main steps: 1) image enhancement and segmentation, 2) orientation detection, 3) feature extraction, and 4) classification [1]. This work was focused on above four categories but main limitation was change of color was happening very rapidly by the change in the different lighting condition, which may cause error or even failures. For example, due to insufficient light condition, the existence of hand area is not detected but the non-skin regions are mistaken for the hand area because of same color [2]. Involves three main steps for hand gesture recognition system: 1) segmentation, 2) feature representation 3) recognition techniques. The system is based on hand gesture recognition by modeling of the hand in spatial domain. The system uses various 2D and 3D geometric and non-geometric models for modeling. It has used fuzzy c-means clustering algorithm which resulted in an accuracy of 85.83%. The main drawback of the system is it does not consider gesture recognition of temporal space, i.e., motion of gestures and it is unable to classify images with complex background i.e., where there are other objects in the scene with the hand objects [3]. This survey focuses on the hand gesture recognition using different steps like data acquisition, pre-processing, segmentation and so on. Suitable input device should be selected for the data acquisition. There are a number of input devices for data acquisition. Some of them are data gloves, marker, and hand images (from webcam/Kinect 3D Sensor). But the limitation with this work was change in the illumination, rotation and orientation, scaling problem and special hardware which is pretty costlier [4]. The system implementation is divided into three phases: 1) Hand gesture recognition using kinetic camera, 2) algorithms for hand detection recognition, 3) hand gesture recognition. The limitation here is that the edge detection and segmentation algorithms used here are not very efficient when compared to neural networks. The dataset being considered here is very small and can be used to detect very few sign gestures. The system architecture consists of: 1) image acquisition, 2) segmentation of hand region, 3) distance transforms method for gesture recognition [5]. The limitations of this system involve 1) the numbers of gestures
  • 3.  ISSN: 2722-3221 Comput. Sci. Inf. Technol., Vol. 1, No. 3, November 2020: 117 – 120 118 that are recognized are less and 2) the gestures recognized were not used to control any applications [6]. In this implementation there are three main algorithms that are used: 1) Viola–Jones algorithm. 2) convex hull algorithm, 3) the AdaBoost based learning algorithm. The work was accomplished by training a set of feature set which is local contour sequence. The limitations of this system are that it requires two sets of images for classification. One is the positive set that contains the required images, the other is the negative set that contains contradicting images [7]. The system implementation consists of three components: 1) hand detection 2) gesture recognition, and 3) HCI. It has implemented the following methodology: 1) the input image is preprocessed and the hand detector tries to filter out the hand from the input image, 2) a CNN classifier is employed to recognize gestures from the processed image, while a Kalman Filter is used to estimate the position of the mouse cursor, and 3) the recognition and estimation results are submitted to a control centre which decides the action to be taken. One of the limitations of this system is that it recognizes only the static images [8]. This implementation focuses on detection of hand gestures using java and neural networks. It is divided into two phases: 1) Detection module using java where in the hand is detected using background subtraction and conversion of video feed into HSB video feed thus detecting skin pixels; 2) The second module is the prediction module; a convolutional neural network is used. The input feed image is gained from Java. The input image is fed into the neural network and is analyzed with respect to the dataset images. One of the limitations of this system is that it requires socket programming in order to connect java and python modules. 3. IMPLEMENTATION A hand gesture recognition system was developed to capture the hand gestures being performed by the user and to control a computer system based on the incoming information. Many of the existing systems in literature have implemented gesture recognition using only spatial modelling, i.e., recognition of a single gesture and not temporal modelling i.e., recognition of motion of gestures. Also, the existing systems have not been implemented in real time, they use a pre captured image as an input for gesture recognition. To overcome these existing problems a new architecture has been developed which aims to design a vision-based hand gesture recognition system with a high correct detection rate along with a high-performance criterion, which can work in a real time HCI system without having any of the mentioned strict limitations (gloves, uniform background, etc.) on the user environment. The design is composed of a HCI system which uses hand gestures as input for communication as show in Figure 2. Figure 2. Design of the proposed HCI system
  • 4. Comput. Sci. Inf. Technol.  Hand gesture recognition using machine learning algorithms… (Abhishek B) 119 Input to the system is from the web camera or a prerecorded video sequence. Later it detects the skin color by using an adaptive algorithm in the beginning of the frames. For the current user skin color has to be fixed based on the lighting and camera parameter and condition. Once it has been fixed, hand is localized with a histogram clustering method. Then a machine learning algorithm has been used to detect the hand gestures in consecutive frames to distinguish the current gesture. These gestures are used as an input for a computer application as shown in Figure 3. The system is divided into 3 subsystems: 3.1. Hand and motion detection The Web-camera captures the hand movement and provides it as input to OpenCV and TensorFlow Object detector. Edge detection and skin detection are performed to obtain the boundary of the hand. This is then sent to the 3D CNN. 3.2. Dataset Dataset is used for training the 3D CNN. Two types of datasets are being used–one for the hand detection and the other for the motion or gesture detection. Hand detection uses EGO dataset, Motion or Gesture Recognition uses Jester dataset. 3.3. 3D CNN CNN’s are a class of deep learning neural networks used for analyzing videos and images. It consists of several layers–input layer, hidden layers, and output layer. It performs back propagation for better accuracy and efficiency. It performs training and verification of the recognized gestures and HCIs take place–turning of the pages, zooming in, and zooming out. The interactions with the computer take place with the help of PyAutoGUI or System Calls. Figure 3. System recognized hand gestures 4. CONCLUSION The importance of gesture recognition lies in building efficient human-machine interaction. This paper describes how the implementation of the system is done based upon the images captured. Hand detection is done using OpenCV and TensorFlow object detector. And further it is enhanced for interpretation of gestures by the computer to perform actions like switching the pages, scrolling up or down the page.
  • 5.  ISSN: 2722-3221 Comput. Sci. Inf. Technol., Vol. 1, No. 3, November 2020: 117 – 120 120 ACKNOWLEDGEMENT This work is done, supervised, and supported by the students and faculty members of the Department of Computer Science and Engineering, BMS Institute of Technology, Bangalore. REFERENCES [1] M. Panwar and P. S. Mehra, “Hand gesture recognition for human computer interaction,” 2011 International Conference on Image Information Processing, Shimla, pp. 1-7, 2011. [2] R. Zaman Khan and N. A. Ibraheem, “Comparative Study of Hand Gesture Recognition System,” International Conference of Advanced Computer Science & Information Technology, 2012. [3] A. R. Sarkar, G. Sanyal, and S. Majumder, “Hand Gesture Recognition Systems: A Survey,” International Journal of Computer Applications, vol. 71, no.15, pp. 25-37, May 2013. [4] A. E. Manjunath, B. P. V. Kumar, H. Rajesh, “Comparative Study of Hand Gesture Recognition Algorithms,” International Journal of Research in Computer and Communication Technology, vol 3, no. 4, April 2014. [5] D. R. Jadhav and L. M. R. J. Lobo, “Navigation of PowerPoint Using Hand Gestures,” International Journal of Science and Research (IJSR), vol. 4, no. 1, pp. 833-837, 2015. [6] R. M. Gurav and P. K. Kadbe, "Real time finger tracking and contour detection for gesture recognition using OpenCV," 2015 International Conference on Industrial Instrumentation and Control (ICIC), pp. 974-977, 2015. [7] P. Xu, “A Real-time Hand Gesture Recognition and Human-Computer Interaction System,” 2017, [Online]. Available: https://arxiv.org/abs/1704.07296 [8] P. Suganya, R. Sathya, and K. Vijayalakshmi, “Detection and Recognition of Gestures to Control the System Applications by Neural Networks,” International Journal of Pure and Applied Mathematics, vol. 118, no. 10, pp. 399-405, January 2018.